<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="http://scrmblog.dumke.me/taxonomy/term/666/all" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:og="http://ogp.me/ns#" xmlns:article="http://ogp.me/ns/article#" xmlns:book="http://ogp.me/ns/book#" xmlns:profile="http://ogp.me/ns/profile#" xmlns:video="http://ogp.me/ns/video#" xmlns:product="http://ogp.me/ns/product#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#">
  <channel>
    <title>analysis</title>
    <link>http://scrmblog.dumke.me/taxonomy/term/666/all</link>
    <description></description>
    <language>en</language>
     <atom:link href="http://scrmblog.dumke.me/taxonomy/term/666/all/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>Modeling Defaults of Companies in Multi-Stage SC Networks</title>
    <link>http://scrmblog.dumke.me/review/modeling-defaults-of-companies-in-multi-stage-sc-networks</link>
    <description>&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/Intern.JournalOfProductionEconomics2010MizgierModelingDefaultsOfCompaniesInMulti-StageSupplyChainNetworks.png?itok=8Zivvkvk&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;Agent-based supply chain models are build using small entities (agents), which might represent a single company.&lt;br /&gt;
Each of the agents has its own goals and rules of operation programmed into a computer. The interaction between several agents of this kind leads to a more realistic and complex behavior of the system. &lt;/p&gt;

	&lt;p&gt;There are several different schools for the quantitative analysis of supply chain risks. Simulation is one of them and agent-based models show several distinct advantages: They are both easier to understand and allow for a more complex system behavior, than other quantitative methods.&lt;/p&gt;

	&lt;p&gt;After this introduction I would like to have a look at a current agent-based supply chain model, which analyzes the effect of bankruptcies on supply chains. The full paper can be downloaded &lt;a href=&quot;http://www.if.pw.edu.pl/~jholyst/data/mizgier_ejor_2009.pdf&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

	&lt;h5&gt;Model&lt;/h5&gt;

	&lt;p&gt;The authors focus on a comprehensive view on the supply chain: several stages (horizontally and vertically) are modeled. Figure 1 shows an exemplary supply chain.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/miezgier_example_network.png&quot; title=&quot;The structure of the supply chain network.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/miezgier_example_network-500x292.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;The structure of the supply chain network.&quot; alt=&quot;The structure of the supply chain network.&quot; width=&quot;500&quot; height=&quot;292&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Exemplary Supply Chain Structure (Mizgier et al. 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Each circle represents one node or agent, the connections are drawn as lines.&lt;br /&gt;
The model features five additional characteristics worth mentioning:
	&lt;ol&gt;
		&lt;li&gt;Price dispersion (prices can vary between companies)&lt;/li&gt;
		&lt;li&gt;Evolution of supply chain topology (links between companies can be changed, by the agents themselves)&lt;/li&gt;
		&lt;li&gt;Network reconfiguration (the reconfiguration is based on the price)&lt;/li&gt;
		&lt;li&gt;Production dynamics (output is determined by the invested working capital)&lt;/li&gt;
		&lt;li&gt;Dynamics of costs of production (random changes to the environment every five periods, lead to changes in the cost function of the companies)&lt;/li&gt;
	&lt;/ol&gt;&lt;/p&gt;

	&lt;p&gt;Last but not least, companies may go bankrupt if they are not able to perform their short therm debts. There are no loans.&lt;/p&gt;

	&lt;h5&gt;Results&lt;/h5&gt;

	&lt;p&gt;First, the network performs as expected. During the first period turbulences can be observed. Figure 2 shows the utilization of working capital during the simulation (1 equals 100%).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/miezgier_network_stabilization.png&quot; title=&quot;Performance of the network&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/miezgier_network_stabilization-500x362.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Performance of the network&quot; alt=&quot;Performance of the network&quot; width=&quot;500&quot; height=&quot;362&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Capacity Utilization (Mizgier et al. 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;After 200 iterations a typical start scenario might look like figure 3.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/mizgier_initial_network.png&quot; title=&quot;State of the network after the test period&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/mizgier_initial_network-500x344.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;State of the network after the test period&quot; alt=&quot;State of the network after the test period&quot; width=&quot;500&quot; height=&quot;344&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Network Structure after Initialization Period (Mizgier et al. 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Starting from this state the &lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;The firms with the best profit/cost ratio are growing and adding new suppliers, whereas the working capital of the firms whose sales price is higher than the mean price of the given stage is slowly decaying and results in the defaults of firms.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;A stable state might look like figure 4.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/mizgier_stable_network.png&quot; title=&quot;State of the network after reaching the stable configuration.&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/mizgier_stable_network-500x322.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;State of the network after reaching the stable configuration.&quot; alt=&quot;State of the network after reaching the stable configuration.&quot; width=&quot;500&quot; height=&quot;322&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Network Structure after Stabilization (Mizgier et al. 2012)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;The authors deduce three implications from those results:&lt;br /&gt;
&lt;blockquote&gt;
	&lt;ul&gt;
		&lt;li&gt;The first implication is that during the process of assessment of the company’s risk exposure, managers should keep their focus on the global structure of the supply chain network instead of being restricted to the own portfolio of suppliers and customers.&lt;/li&gt;
		&lt;li&gt;Secondly, as a result of the dynamics of the topology of the supply chain network, strong competition in prices and fast changing technology, even the most reliable firms should be monitored and constantly re-evaluated in terms of their production capacity and risks associated with their structure of connections.&lt;/li&gt;
		&lt;li&gt;Third and most important, managers should find ways to cut costs and reinvest the free cash flows in new technology of production, which will allow further cost reductions and the development of new innovative and cheaper products.&lt;br /&gt;
&lt;/blockquote&gt;&lt;/li&gt;
	&lt;/ul&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;Being stuck in the supply chain can lead to negative consequences, when ripple effects cause multiple suppliers and customers to default. Furthermore, these supply chain partners might also not be the most efficient ones, and these prices affect each participating company.&lt;br /&gt;
All in all, a great paper, but I would have liked to read more about the authors&amp;#8217; efforts to validate and verify the model&amp;#8217;s integrity.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=International+Journal+of+Production+Economics&amp;amp;rft_id=info%3Adoi%2F10.1016%2Fj.ijpe.2010.09.022&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Modeling+defaults+of+companies+in+multi-stage+supply+chain+networks&amp;amp;rft.issn=09255273&amp;amp;rft.date=2012&amp;amp;rft.volume=135&amp;amp;rft.issue=1&amp;amp;rft.spage=14&amp;amp;rft.epage=23&amp;amp;rft.artnum=http%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS0925527310003609&amp;amp;rft.au=Mizgier%2C+K.&amp;amp;rft.au=Wagner%2C+S.&amp;amp;rft.au=Holyst%2C+J.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Mizgier, K., Wagner, S., &amp;amp; Holyst, J. (2012). Modeling defaults of companies in multi-stage supply chain networks &lt;span style=&quot;font-style: italic;&quot;&gt;International Journal of Production Economics, 135&lt;/span&gt; (1), 14-23 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1016/j.ijpe.2010.09.022&quot;&gt;10.1016/j.ijpe.2010.09.022&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/666/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--2&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Modeling Defaults of Companies in Multi-Stage SC Networks 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Modeling Defaults of Companies in Multi-Stage SC Networks 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Modeling Defaults of Companies in Multi-Stage SC Networks 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Modeling Defaults of Companies in Multi-Stage SC Networks 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Modeling Defaults of Companies in Multi-Stage SC Networks 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-HvjyCfMQP9MDsfgpKZ08SKZAA-QlTQc2VyG412mUg_k&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/agent-based&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;agent-based&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/simulation&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;Simulation&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/analysis&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;analysis&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 28 May 2012 14:07:06 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1805 at http://scrmblog.dumke.me</guid>
  </item>
  <item>
    <title>Assessment of Supply Chain Vulnerabilities</title>
    <link>http://scrmblog.dumke.me/review/assessment-of-supply-chain-vulnerabilities</link>
    <description>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot;&gt;	&lt;p&gt;This is a review of another chapter of the book by Zsidisin and Ritchie (Supply Chain Risk). The book can be bought at &lt;a href=&quot;https://www.amazon.com/Supply-Chain-Risk-Performance-International/dp/1441946454/189-2256215-6931423?ie=UTF8&amp;amp;amp;camp=1789&amp;amp;amp;creative=390957&amp;amp;amp;creativeASIN=1441946454&amp;amp;amp;linkCode=as2&amp;amp;amp;redirect=true&amp;amp;amp;ref_=as_li_ss_tl&amp;amp;amp;tag=s05b5a-20&quot;&gt;amazon.com&lt;/a&gt;, if you are interested in reading more.&lt;/p&gt;

	&lt;p&gt;I already reviewed chapter 15 on &lt;a href=&quot;http://scrmblog.dumke.me/review/behavioral-risks-in-supply-networks&quot; title=&quot;SCRM Blog: Behavioral Risks in Supply Networks&quot;&gt;Behavioral Risks in Supply Networks&lt;/a&gt;.&lt;/p&gt;

	&lt;p&gt;The title of this weeks article is &amp;#8220;Assessing the Vulnerability of Supply Chains&amp;#8221; and since the author works for a consulting firm you can expect a more practice oriented approach to risk analysis.&lt;/p&gt;

	&lt;h5&gt;Goals and definitions&lt;/h5&gt;

	&lt;p&gt;There are three main questions to be answered in this article:&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand the nature and types of factors that may pose threats and risks to the achievement of the supply chain system’s short and long term mission.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand the scenarios (processes and mechanisms) through which these threats, risks and vulnerabilities may evolve.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Understand how through the use of vulnerability scenarios, the likelihood and consequences of such threats may be reduced and managed in a cost- and service effective manner, whilst achieving an acceptable vulnerability level.&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;A vulnerability of a supply chain in this context is defined as&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;the properties of a supply chain system; its premises, facilities, and equipment, including its human resources, human organization and all its software, hardware, and net-ware, that may weaken or limit its ability to endure threats and survive accidental events that originate both within and outside the system boundaries.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;Vulnerability analysis is seen as an extension to risk analysis.&lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;p&gt;Risk analysis is focused towards the human, environmental and property impacts of an accidental event, while a vulnerability analysis is focused towards the system mission and the survivability of the system.&lt;/p&gt;

	&lt;p&gt;In a risk analysis three questions make up the basis of the analysis: (i) what can go wrong, (ii) how likely is it to happen, and (iii) what are the consequences.&lt;/p&gt;

	&lt;p&gt;A vulnerability analysis, on the other hand, focuses upon (a) an extended set of threats and consequences, (b) adequate resources to mitigate and bring the system back to new stability, and &amp;#169; the disruption time before new stability is established [figure 1].&lt;/p&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettdisruptionflow.png&quot; title=&quot;Regaining stability after an accidental event or disruption&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettdisruptionflow-500x209.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Regaining stability after an accidental event or disruption&quot; alt=&quot;Regaining stability after an accidental event or disruption&quot; width=&quot;500&quot; height=&quot;209&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 1: Disruption Sequence (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Vulnerability Analysis&lt;/h5&gt;

	&lt;p&gt;Based on this definitions the author builds his approach on a generic approach for risk assessment. The flow chart in figure 2 highlights the seven steps.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettvilnerabilityanalysis.png&quot; title=&quot;Flow-sheet of the vulnerability analysis&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettvilnerabilityanalysis-500x340.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Flow-sheet of the vulnerability analysis&quot; alt=&quot;Flow-sheet of the vulnerability analysis&quot; width=&quot;500&quot; height=&quot;340&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 2: Vulnerability Analysis Process (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;These steps fall into three categories: &lt;/p&gt;

	&lt;p&gt;&lt;blockquote&gt;&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;Understanding the context-specific threat and risk picture of the given supply chain and &lt;span class=&quot;caps&quot;&gt;SCM&lt;/span&gt; context, and structure this into a taxonomy of the vulnerability factors [steps 1 to 3].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Analyse and rank the vulnerability scenarios, resulting in a criticality ranking of the scenarios [steps 4 and 5].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;ol&gt;
		&lt;li&gt;Handling of the vulnerability through cost- or service-effective likelihood or consequence reducing measures, bringing the vulnerability down to an acceptable level [steps 6 and 7].&lt;/li&gt;
	&lt;/ol&gt;

	&lt;p&gt;&lt;/blockquote&gt;&lt;/p&gt;

	&lt;p&gt;The goal of the &lt;em&gt;first step&lt;/em&gt; is to have a common understanding of the specific objectives of the vulnerability analysis, the level of analysis and setting the levels of acceptable risk.&lt;/p&gt;

	&lt;p&gt;In the &lt;em&gt;second step&lt;/em&gt; the processes and infrastructure has to be mapped. Flows of money, information and goods are highlighted. Here, &amp;#8220;it is recommended not to make the context description too fine-grained, but rather make notes of how the context could further be detailed if required.&amp;#8221;&lt;/p&gt;

	&lt;p&gt;In the &lt;em&gt;third step&lt;/em&gt; factors which lead to vulnerabilities are collected in a structured manner. Figure 3 shows a fishbone diagram with several different categories which can lead to vulnerabilities.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettcontributingfactors.png&quot; title=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettcontributingfactors-500x265.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot; alt=&quot;Fishbone diagram of internal and external factors contributing to vulnerability&quot; width=&quot;500&quot; height=&quot;265&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 3: Example of Factors Contributing to Vulnerabilities (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;Based on these vulnerabilities adverse scenarios are developed in the &lt;em&gt;next step&lt;/em&gt;.&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;A scenario is a sequence of possible events, originating from an accidental event, where the events may be separated in time and space, and where barriers to prevent the sequence are part of the scenario.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;In the &lt;em&gt;next step&lt;/em&gt; the mentioned scenarios have to be documented. The author suggests the worksheet in figure 4.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettvulnerabilityscenarios.png&quot; title=&quot;documenting vulnerability scenarios&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettvulnerabilityscenarios-500x82.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;documenting vulnerability scenarios&quot; alt=&quot;documenting vulnerability scenarios&quot; width=&quot;500&quot; height=&quot;82&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 4: Template for Scenario Documentation (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;To get a better grasp of the actual criticality of the revealed vulnerabilities, each scenario has to be evaluated according to its likelihood and consequences (&lt;em&gt;step 5&lt;/em&gt;). Figure 5 has a sample sheet.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettcriticalityranking.png&quot; title=&quot;ranking criticality of scenarios&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettcriticalityranking-500x138.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;ranking criticality of scenarios&quot; alt=&quot;ranking criticality of scenarios&quot; width=&quot;500&quot; height=&quot;138&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 5: Assessment of the Scenario&amp;#8217;s Criticality (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;p&gt;&lt;em&gt;Step 6&lt;/em&gt; is about ranking the different vulnerabilities to best align risk mitigation efforts (figure 6).&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettlikelihoodconsequencediagram.png&quot; title=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettlikelihoodconsequencediagram-500x172.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot; alt=&quot;Presenting scenarios of importance in a likelihood/consequence diagram&quot; width=&quot;500&quot; height=&quot;172&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 6: Likelihood/Consequence Diagramm (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;blockquote&gt;
		&lt;p&gt;As such we have ‘low-criticality’ scenarios in the lower left corner (white), and ‘high-criticality’ scenarios in the upper right corner (dark grey shading). The ‘criticality areas’ should be based on the acceptance criteria developed in step one, both for the un-mitigated and the mitigated consequences.&lt;/p&gt;
	&lt;/blockquote&gt;

	&lt;p&gt;The &lt;em&gt;last step&lt;/em&gt; deals with finding mitigation strategies for selected scenarios. Figure 7 shows the template.&lt;/p&gt;

	&lt;p&gt;&lt;a href=&quot;http://scrmblog.dumke.me/sites/default/files/images/asbjornslettevaluatemeasures.png&quot; title=&quot;evaluating measures with potential to reduce likelihood and consequence&quot;&gt;&lt;img src=&quot;http://scrmblog.dumke.me/sites/default/files/resize/images/asbjornslettevaluatemeasures-500x143.png&quot; style=&quot;width:500px;&quot; class=&quot;article_center&quot; title=&quot;evaluating measures with potential to reduce likelihood and consequence&quot; alt=&quot;evaluating measures with potential to reduce likelihood and consequence&quot; width=&quot;500&quot; height=&quot;143&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

	&lt;p&gt;&lt;span class=&quot;image_comment&quot;&gt;Figure 6: Mitigation Activities to Reduce Likelihood or Consequences of a Vulnerability (Asbjornslett, 2009)&lt;/span&gt;&lt;/p&gt;

	&lt;h5&gt;Conclusion&lt;/h5&gt;

	&lt;p&gt;This article presented a really business oriented approach to vulnerability analysis. In a similar manner how it could be found in a presentation of a business consultant.&lt;/p&gt;

	&lt;p&gt;This business orientation can be also seen in the structure of the article: A conclusive derivation of the process is missing completely at least the definitions are mentioned.&lt;/p&gt;

	&lt;p&gt;Nonetheless, from experience I can tell that this process contains several important steps which are also known from scientific literature. And it really is immediately applicable.&lt;/p&gt;

	&lt;p&gt;Why not include some of the insights and steps presented here in your next risk-management-meeting?&lt;/p&gt;

	&lt;p&gt;If you want to have a more scientific view on vulnerability analysis have a look at &lt;a href=&quot;http://scrmblog.dumke.me/review/assessing-vulnerability-of-a-supply-chain&quot; title=&quot;SCRM Blog: Assessing Vulnerability of a Supply Chain&quot;&gt;this article&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-thumbnail field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;img typeof=&quot;foaf:Image&quot; src=&quot;http://scrmblog.dumke.me/sites/default/files/styles/thumbnail/public/pubthumb/2009AsbjornslettAssessingTheVulnerabilityOfSupplyChains.png?itok=O8fHBBXe&quot; width=&quot;80&quot; height=&quot;80&quot; alt=&quot;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-research-blogging field-type-text-long field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Reference:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span class=&quot;Z3988&quot; title=&quot;ctx_ver=Z39.88-2004&amp;amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;amp;rft.jtitle=Supply+Chain+Risk+-+A+Handbook+of+Assessment%2C+Management%2C+and+Performance&amp;amp;rft_id=info%3Adoi%2F10.1007%2F978-0-387-79934-6_2&amp;amp;rfr_id=info%3Asid%2Fresearchblogging.org&amp;amp;rft.atitle=Assessing+the+Vulnerability+of+Supply+Chains&amp;amp;rft.issn=&amp;amp;rft.date=2009&amp;amp;rft.volume=&amp;amp;rft.issue=&amp;amp;rft.spage=15&amp;amp;rft.epage=33&amp;amp;rft.artnum=&amp;amp;rft.au=Asbjornslet%2C+B.+E.&amp;amp;rfe_dat=bpr3.included=1;bpr3.tags=Other%2CBusiness+Management%2C+Supply+Chain+Management&quot;&gt;Asbjornslet, B. E. (2009). Assessing the Vulnerability of Supply Chains &lt;span style=&quot;font-style: italic;&quot;&gt;Supply Chain Risk - A Handbook of Assessment, Management, and Performance&lt;/span&gt;, 15-33 DOI: &lt;a rev=&quot;review&quot; href=&quot;http://dx.doi.org/10.1007/978-0-387-79934-6_2&quot;&gt;10.1007/978-0-387-79934-6_2&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-user-rating field-type-fivestar field-label-above&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Rate This:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;form class=&quot;fivestar-widget&quot; action=&quot;/taxonomy/term/666/all/feed&quot; method=&quot;post&quot; id=&quot;fivestar-custom-widget--2&quot; accept-charset=&quot;UTF-8&quot;&gt;&lt;div&gt;&lt;div  class=&quot;clearfix fivestar-average-stars fivestar-form-item fivestar-outline&quot;&gt;&lt;div class=&quot;form-item form-type-fivestar form-item-vote&quot;&gt;
 &lt;div class=&quot;form-item form-type-select form-item-vote&quot;&gt;
 &lt;select id=&quot;edit-vote--4&quot; name=&quot;vote&quot; class=&quot;form-select&quot;&gt;&lt;option value=&quot;-&quot;&gt;Select rating&lt;/option&gt;&lt;option value=&quot;20&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 1/5&lt;/option&gt;&lt;option value=&quot;40&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 2/5&lt;/option&gt;&lt;option value=&quot;60&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 3/5&lt;/option&gt;&lt;option value=&quot;80&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 4/5&lt;/option&gt;&lt;option value=&quot;100&quot; selected=&quot;selected&quot;&gt;Give Assessment of Supply Chain Vulnerabilities 5/5&lt;/option&gt;&lt;/select&gt;
&lt;/div&gt;

&lt;div class=&quot;description&quot;&gt;Fivestar rating field for readers to rate the content.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;input class=&quot;fivestar-submit form-submit&quot; type=&quot;submit&quot; id=&quot;edit-fivestar-submit--2&quot; name=&quot;op&quot; value=&quot;Rate&quot; /&gt;&lt;input type=&quot;hidden&quot; name=&quot;form_build_id&quot; value=&quot;form-R-d76wBZBXZk3qeQ8kDNihfllPsK2_1-OWdrz1wchR4&quot; /&gt;
&lt;input type=&quot;hidden&quot; name=&quot;form_id&quot; value=&quot;fivestar_custom_widget&quot; /&gt;
&lt;/div&gt;&lt;/form&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-tags-review field-type-taxonomy-term-reference field-label-inline clearfix&quot;&gt;&lt;div class=&quot;field-label&quot;&gt;Tags:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/tags/vulnerability&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;vulnerability&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;field-item odd&quot;&gt;&lt;a href=&quot;/tags/analysis&quot; typeof=&quot;skos:Concept&quot; property=&quot;rdfs:label skos:prefLabel&quot; datatype=&quot;&quot;&gt;analysis&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-count-pixel field-type-text-long field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;img src=&quot;http://vg05.met.vgwort.de/na/50b7c288cb4c428c853780f337d70ae5&quot; width=&quot;1&quot; height=&quot;1&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 02 Apr 2012 14:34:31 +0000</pubDate>
 <dc:creator>Daniel Dumke</dc:creator>
 <guid isPermaLink="false">1788 at http://scrmblog.dumke.me</guid>
  </item>
  </channel>
</rss>
